-
2
-
-
0036870280
-
SIP Security Issues: The SIP Authentication Procedure and its Processing Load
-
November
-
S. Salsano, L. Veltri, and D. Papalilo. SIP Security Issues: The SIP Authentication Procedure and its Processing Load. In IEEE Networks, pages 38-44, November 2002.
-
(2002)
IEEE Networks
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
5
-
-
34548187761
-
-
Mark D.Collier Session Initiation Protocol Vulnerabilities, IPCOMM 2006.
-
Mark D.Collier "Session Initiation Protocol Vulnerabilities", IPCOMM 2006.
-
-
-
-
6
-
-
70449570820
-
SIP Security Requirements
-
work in progress, Nov
-
M.Thomas, "SIP Security Requirements," IETF Internet draft, work in progress, Nov. 2001.
-
(2001)
IETF Internet draft
-
-
Thomas, M.1
-
7
-
-
34548145155
-
Basic Vulnerability Issues for SIP Security
-
Mark Collier. "Basic Vulnerability Issues for SIP Security", Research Report, 2005
-
(2005)
Research Report
-
-
Collier, M.1
-
8
-
-
77953069969
-
Abstracting Application-Level Web Security
-
ACM Press, New York, May
-
Scott D. and Sharp R., "Abstracting Application-Level Web Security," Proc. 11th Int'l World Wide Web Conf., ACM Press, New York, May 2002, pp. 396-407.
-
(2002)
Proc. 11th Int'l World Wide Web Conf
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
9
-
-
33947171900
-
A Novel Approach to Detection of Intrusions in Computer Networks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods
-
Sep
-
Alexander G Tartakovsky, "A Novel Approach to Detection of Intrusions in Computer Networks via Adaptive Sequential and Batch-Sequential Change-Point Detection Methods," IEEE transactions on signal processing. Vol.54 No.9, Sep 2006.
-
(2006)
IEEE transactions on signal processing
, vol.54
, Issue.9
-
-
Tartakovsky, A.G.1
-
10
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
LISA
-
M.Roesch, "Snort: Lightweight intrusion detection for networks," In Proc. 13th Syst. Admin.Conf. (LISA), 1999, pp. 229-238.
-
(1999)
Proc. 13th Syst. Admin.Conf
, pp. 229-238
-
-
Roesch, M.1
-
11
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France, Nov. 10-12
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. 10th IEEE Int. Conf. Network Protocols (ICNP), Paris, France, Nov. 10-12, 2002, pp. 312-321.
-
(2002)
Proc. 10th IEEE Int. Conf. Network Protocols (ICNP)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
13
-
-
0142095474
-
Using Artificial anomalies to detect Unknown and known network intrusions
-
Nov.-2 Dec, Pages
-
Wei Fan "Using Artificial anomalies to detect Unknown and known network intrusions," Proceedings IEEE International Conference on 29 Nov.-2 Dec. 2001 Page(s):123-130
-
(2001)
Proceedings IEEE International Conference on 29
, pp. 123-130
-
-
Fan, W.1
-
14
-
-
34548183575
-
An Anomaly&Signature-based Intrusion Detection System Model
-
China, Sept
-
Frans David. "An Anomaly&Signature-based Intrusion Detection System Model", Computing Technology and Automation, China, Vol.23, No.3, Sept 2004
-
(2004)
Computing Technology and Automation
, vol.23
, Issue.3
-
-
David, F.1
-
15
-
-
0038323501
-
Live traffic analysis of TCP/IP gateways
-
San Diego, Mar
-
P. Porras and A. Valdes. "Live traffic analysis of TCP/IP gateways," In Proc. ISOC Symp. NDSS, San Diego, Mar. 1998.
-
(1998)
Proc. ISOC Symp. NDSS
-
-
Porras, P.1
Valdes, A.2
-
16
-
-
34548168611
-
-
A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION
-
A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION
-
-
-
-
17
-
-
0027150412
-
Ustat: A real-time intrusion detection system for Unix
-
Oakland, CA, May
-
K. Ilgun, "Ustat: A real-time intrusion detection system for Unix," in Proc. IEEE Symp. Res. Security Privacy, Oakland, CA, May 1993, pp. 16-28.
-
(1993)
Proc. IEEE Symp. Res. Security Privacy
, pp. 16-28
-
-
Ilgun, K.1
-
18
-
-
34548146084
-
VoIP Intrusion Detection Through Interacting Protocol State Machines Dependable Systems and Networks, 2006. DSN 2006
-
June
-
Sengar, H. "VoIP Intrusion Detection Through Interacting Protocol State Machines" Dependable Systems and Networks, 2006. DSN 2006. International Conference on 25-28 June 2006
-
(2006)
International Conference on 25-28
-
-
Sengar, H.1
-
19
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
CCS, Washington DC, November
-
R. Sekar, A. Gupta. Specification-based anomaly detection: A new approach for detecting network intrusions. In ACM Computer and Communication Security Conference (CCS), Washington DC, November 2002.
-
(2002)
ACM Computer and Communication Security Conference
-
-
Sekar, R.1
Gupta, A.2
-
21
-
-
34548191551
-
Planning, Petri Nets, and Intrusion Detection
-
National Information Systems Security Conference
-
Deborah Frincke. "Planning, Petri Nets, and Intrusion Detection," 21st Proc. National Information Systems Security Conference.
-
21st Proc
-
-
Frincke, D.1
-
22
-
-
0002028280
-
A pattern matching model for misuse intrusion detection
-
Oct
-
S. Kumar and E. Spafford. "A pattern matching model for misuse intrusion detection," In Proc. 17th Nat. Comput Security Conf., Oct. 1994, pp. 11-21.
-
(1994)
Proc. 17th Nat. Comput Security Conf
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.2
-
24
-
-
31044448292
-
Towards the automatic generation of mobile agents for distributed intrusion detection system
-
Yanxin Wang*. "Towards the automatic generation of mobile agents for distributed intrusion detection system," The Journal of Systems and Software 79 (2006) 1-14
-
(2006)
The Journal of Systems and Software
, vol.79
, pp. 1-14
-
-
Wang*, Y.1
-
26
-
-
15944385743
-
Hierarchical CPN model-based diagnosis using HAZOP knowledge
-
SCL-009/2003
-
E. Németh, "Hierarchical CPN model-based diagnosis using HAZOP knowledge," Research Report SCL-009/2003
-
Research Report
-
-
Németh, E.1
-
28
-
-
4544342880
-
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
-
June
-
Y.Wu, S. Bagchi, S. Garg, N. Singh, and T. Tsai. SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. In IEEE Dependable Systems and Networks Conference (DSN 2004), June 2004.
-
(2004)
IEEE Dependable Systems and Networks Conference (DSN
-
-
Wu, Y.1
Bagchi, S.2
Garg, S.3
Singh, N.4
Tsai, T.5
|